Home
Packages
Vulnerabilities
Vendors
Report
Policy
Login
Signup
« List of all packages
core
Subscribe
Opam page:
https://opam.ocaml.org/packages/core/
Versions
Version
core.v0.17.2
(latest)
Subscribe
core.v0.17.1
Subscribe
core.v0.17.0
Subscribe
core.v0.16.2
Subscribe
core.v0.16.1
Subscribe
core.v0.16.0
Subscribe
core.v0.15.1
Subscribe
core.v0.15.0
Subscribe
core.v0.14.1
Subscribe
core.v0.14.0
Subscribe
core.v0.13.0
Subscribe
core.v0.12.4
Subscribe
core.v0.12.3
Subscribe
core.v0.12.2
Subscribe
Vulnerable external dependencies (76440)
Product
For package
Vendor
Severity
CVE
Published
linux-headers
core.v0.14.0
Linux
Unknown
CVE-2026-23107 - arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA
2/4/2026
linux-headers
core.v0.12.3
Linux
Unknown
CVE-2026-23107 - arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA
2/4/2026
linux-headers
core.v0.14.1
Linux
Unknown
CVE-2026-23107 - arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA
2/4/2026
linux-headers
core.v0.13.0
Linux
Unknown
CVE-2026-23107 - arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA
2/4/2026
linux-headers
core.v0.12.2
Linux
Unknown
CVE-2026-23106 - timekeeping: Adjust the leap state for the correct auxiliary timekeeper
2/4/2026
linux-headers
core.v0.13.0
Linux
Unknown
CVE-2026-23106 - timekeeping: Adjust the leap state for the correct auxiliary timekeeper
2/4/2026
linux-headers
core.v0.12.4
Linux
Unknown
CVE-2026-23106 - timekeeping: Adjust the leap state for the correct auxiliary timekeeper
2/4/2026
linux-headers
core.v0.14.1
Linux
Unknown
CVE-2026-23106 - timekeeping: Adjust the leap state for the correct auxiliary timekeeper
2/4/2026
linux-headers
core.v0.14.0
Linux
Unknown
CVE-2026-23106 - timekeeping: Adjust the leap state for the correct auxiliary timekeeper
2/4/2026
linux-headers
core.v0.12.3
Linux
Unknown
CVE-2026-23106 - timekeeping: Adjust the leap state for the correct auxiliary timekeeper
2/4/2026
linux-headers
core.v0.14.1
Linux
High
CVE-2026-23105 - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag
2/4/2026
linux-headers
core.v0.14.0
Linux
High
CVE-2026-23105 - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag
2/4/2026
linux-headers
core.v0.12.4
Linux
High
CVE-2026-23105 - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag
2/4/2026
linux-headers
core.v0.12.3
Linux
High
CVE-2026-23105 - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag
2/4/2026
linux-headers
core.v0.12.2
Linux
High
CVE-2026-23105 - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag
2/4/2026
linux-headers
core.v0.13.0
Linux
High
CVE-2026-23105 - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag
2/4/2026
linux-headers
core.v0.14.0
Linux
Unknown
CVE-2026-23104 - ice: fix devlink reload call trace
2/4/2026
linux-headers
core.v0.12.2
Linux
Unknown
CVE-2026-23104 - ice: fix devlink reload call trace
2/4/2026
linux-headers
core.v0.12.3
Linux
Unknown
CVE-2026-23104 - ice: fix devlink reload call trace
2/4/2026
linux-headers
core.v0.12.4
Linux
Unknown
CVE-2026-23104 - ice: fix devlink reload call trace
2/4/2026
Previous
1...
132
133
134
135
136
137
138
139
140
141
142
...3822
Next